AT&T iPad hackers' chats were turned in by secret source
IDG News Service - The government's case against two men charged with hacking into AT&T's website to steal e-mail addresses from about 120,000 iPad users got a boost last year when a confidential source handed over 150 pages of chat logs between the two and other members of their hacking group.
Excerpts from the logs, published in the court record, apparently show them talking about the legal risk of their hacking adventures, as well as ways that they could maximize the embarrassment caused by the incident. The logs were handed over to federal investigators in July by an unnamed source who monitored the men's online IRC (Internet Relay Chat) conversations.
In a case that was unsealed Tuesday, Andrew Auernheimer, 25, and Daniel Spitler, 26, are charged with fraud and conspiracy to access a computer without authorization. Prosecutors say the two gained unauthorized access to AT&T's servers in early June 2010, and then downloaded 120,000 email addresses and unique ICC-ID (integrated circuit card identifier) numbers, used to identify mobile devices, which they then handed over to the press.
They could face five years in prison on the charges, the U.S. Department of Justice said in a press release. Prosecutors say that the hackers wrote a program called iPad 3G Account Slurper that launched a brute force attack against AT&T's servers, trying to guess ICC-ID numbers and then pairing them to user email addresses.
Spitler had not talked publicly about the incident, but in the days after it hit the press, Auernheimer gave several interviews, saying that the work was done by his hacking group in order to improve privacy for iPad users.
"We believe what we did was ethical," Auernheimer told Computerworld last June. "What we did was right."
But in chat excerpts posted by prosecutors, the men seemed most interested in gaining attention for their find. "[W]here can we drop this for max lols," asked Spitler in one exchange.
In another exchange, Spitler worried about whether the work is legal and asks to remain anonymous. "[D]unno how legal this is or if they could sue for damages," he said.
"[A]bsolutely may be legal risk yeah, mostly civil," Auernheimer replied, according to the transcript. "[A]bsolutely could get sued."
In another exchange, published after the media had reported the breach, Auernheimer apparently admitted that his group had not disclosed the issue to AT&T, according to court records. "[Y]ou DID call tech support right?" asked one hacker, named Nstyr. [cq] "[T]otally but not really," Auernheimer replied. "[I] don't... care [I] hope they sue me."
It's not clear who provided the logs to the U.S. Federal Bureau of Investigation, but around the time that happened someone anonymously posted the alleged names of the hacking group's members to the Full Disclosure mailing list, writing, "ATTENTION FBI - Want the real names folks involved in the iPad hack???" Spitler was among those identified in the post.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to... All Cybercrime and Hacking White Papers | Webcasts